15 May 2018

Pentagon Wants Cloud Secure Enough to Hold Nuke Secrets

“The Defense Department’s Joint Enterprise Defense Infrastructure cloud will be designed to host the government’s most sensitive classified data, including critical nuclear weapon design information and other nuclear secrets.” Source: Pentagon Wants Cloud Secure Enough to Hold Nuke Secrets – Nextgov

Read More
14 May 2018

Iran’s Hacker Hierarchy Exposed

“When pursuing quick-turn cyber operations, the Iranian regime will weigh religious and political reliability against offensive skills. The best operators are not always the most devout or loyal to the regime and we assess that, in this case, the IRGC may forgo careful contractor selection and planning in an attempt

Read More
14 May 2018

Here’s How a National Cybersecurity Agency Could Work

“Over the past few months, some private-sector companies have called for building a national cybersecurity agency. This agency would consist of a centralized authority responsible for the nation’s cybersecurity that would harmonize policies and set priorities across the government.” Source: Here’s How a National Cybersecurity Agency Could Work – Nextgov

Read More
14 May 2018

Critical PGP and S/MIME bugs can reveal encrypted e-mails.

“The Internet’s two most widely used methods for encrypting e-mail–PGP and S/Mime–are vulnerable to hacks that can reveal the plaintext of encrypted messages, a researcher warned late Sunday night. He went on to say there are no reliable fixes and to advise anyone who uses either encryption standard for sensitive

Read More
11 May 2018

CIA to Use Amazon Cloud to Run Big Data Intelligence Experiments

“The Central Intelligence Agency is looking to team up with industry experts to run a series of open-source intelligence projects using its Amazon cloud. The agency released a revised acquisition schedule on May 7 for a project known as Mesa Verde that will test the frontiers of big data and

Read More
11 May 2018

Three Critical Factors Increasing Cyber Risk for 2019

In 2008, I wrote and essay entitled “The Year of Living Cyberdangerously” in which I noted that I couldn’t “help but think that 2009 will be a precipice year in the cybersecurity domain.” My gut instinct was right, in that 2009 brought us the Aurora attacks and the popularization of

Read More
11 May 2018

Hacker Shuts Down Copenhagen’s Public City Bikes System

“An unidentified hacker has breached Bycyklen —Copenhagen’s city bikes network— and deleted the organization’s entire database, disabling the public’s access to bicycles over the weekend.” Source: Hacker Shuts Down Copenhagen’s Public City Bikes System

Read More
11 May 2018

Apple kicks out iOS apps that share location data without asking you first

“Apple has removed a bunch of apps in the App Store that send location data to third parties without obtaining user consent, according to a report.” Source: Apple kicks out iOS apps that share location data without asking you first | ZDNet

Read More
11 May 2018

Iran likely to retaliate with cyberattacks after nuclear deal collapse

“Iran is likely to respond with cyberattacks against Western businesses in response to the Trump administration’s withdrawal from the nuclear deal, cybersecurity experts say.” Source: Iran likely to retaliate with cyberattacks after nuclear deal collapse | ZDNet

Read More
10 May 2018

The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks

“Some still-unconfirmed signs suggest that Iran may be developing the ability to not only disrupt critical infrastructure with cyberattacks, but to destroy it. A highly sophisticated malware known as Trisis or Triton hit Saudi Aramco last year, and is designed to manipulate the company’s physical safety equipment, with potentially lethal

Read More